Cybercriminals actively sell access to tens of thousands of unpatched Chinese surveillance cameras exploiting an 11-month-old critical vulnerability. Organizations running affected models remain exposed despite patch availability.

The threat actors monetize camera access on underground forums and marketplaces. Buyers gain remote control of devices, enabling reconnaissance, network lateral movement, or direct surveillance operations against target organizations.

Root cause: Organizations failed to apply patches within an 11-month window following public disclosure. This extended vulnerability window reflects poor patch management practices across sectors relying on these devices.

Defenders must immediately inventory Chinese surveillance camera deployments. Verify current firmware versions against vendor patch advisories. Isolate camera networks on segregated VLANs with restricted egress. Implement network detection rules for abnormal camera behavior. Monitor for unauthorized remote access attempts to device management interfaces.

The threat persists because camera management often receives lower priority than endpoint or server patching. Many organizations treat these devices as "set and forget" infrastructure. This incident demonstrates that surveillance systems require equivalent patch discipline as critical networked assets.

Organizations should assume adversaries already possess access to unpatched units. Threat hunters should prioritize reviewing camera access logs and network flows for exfiltration activity.